E:\WorkPlace\AndroidEmulator\OnlyVDI_NEW\Basic\Client\Output\Binfinal\VdiTools\TVdiInstall.pdb
Static task
static1
Behavioral task
behavioral1
Sample
111d6800130aa4f8a5e6d1909855d5b6d74917c960edf963bfd242ad4e628131.exe
Resource
win7-20240221-en
General
-
Target
111d6800130aa4f8a5e6d1909855d5b6d74917c960edf963bfd242ad4e628131
-
Size
1.7MB
-
MD5
3bc69dd0ed62e1275df9e0a0c73fdd3f
-
SHA1
06178158b00c87599bbbaacac89ccc6a0ef5c2a1
-
SHA256
111d6800130aa4f8a5e6d1909855d5b6d74917c960edf963bfd242ad4e628131
-
SHA512
41827f61085259ada31ffdf77df149c781fbb2dafee62f8b06fdccd725791d5e1b1ed380d3d29b56767fc9d67b2fc24ac7e3130e746e16f652020e222d4eb31c
-
SSDEEP
24576:LElfLCc+UsqjnhMgeiCl7G0nehbGZpbD:AlDb+wDmg27RnWGj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 111d6800130aa4f8a5e6d1909855d5b6d74917c960edf963bfd242ad4e628131
Files
-
111d6800130aa4f8a5e6d1909855d5b6d74917c960edf963bfd242ad4e628131.exe windows:6 windows x86 arch:x86
7c4dec264453a1af8d5bd29f7289fcae
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
psapi
GetModuleFileNameExW
shlwapi
PathRemoveFileSpecW
PathFileExistsW
PathIsDirectoryW
kernel32
FindResourceExW
GetModuleHandleW
GetProcAddress
DecodePointer
DeleteFileW
GetModuleFileNameW
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
GetCommandLineW
GetPrivateProfileStringW
GetPrivateProfileIntW
GetPrivateProfileSectionW
GetFileAttributesW
Sleep
MultiByteToWideChar
WideCharToMultiByte
CloseHandle
CreateFileW
FindFirstFileW
ReadFile
DeviceIoControl
GetTickCount
WriteFile
SetFilePointer
GetCurrentProcess
RemoveDirectoryW
FindNextFileW
FindClose
FindResourceW
GetLogicalDrives
GetDriveTypeW
GetDiskFreeSpaceExW
EnterCriticalSection
LeaveCriticalSection
GetCurrentThreadId
ExpandEnvironmentStringsW
GetLongPathNameW
GetLocalTime
CreateDirectoryW
LoadLibraryW
SetFileAttributesW
WaitForSingleObject
FreeLibrary
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
OpenProcess
TerminateProcess
MoveFileExW
CopyFileW
VirtualAlloc
VirtualFree
GetACP
FormatMessageW
OpenMutexW
GetCPInfo
GetOEMCP
IsValidCodePage
SizeofResource
LockResource
SetEndOfFile
LoadResource
DeleteCriticalSection
InitializeCriticalSectionEx
GetLastError
RaiseException
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
SetStdHandle
WriteConsoleW
FindNextFileA
FindFirstFileExA
LCMapStringW
CompareStringW
EncodePointer
QueryPerformanceCounter
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
IsDebuggerPresent
OutputDebugStringW
SetEvent
ResetEvent
WaitForSingleObjectEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
GetStartupInfoW
GetCurrentProcessId
InitializeSListHead
RtlUnwind
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetModuleFileNameA
GetStdHandle
GetCommandLineA
GetStringTypeW
GetFileType
SetFilePointerEx
GetConsoleMode
ReadConsoleW
GetConsoleCP
FlushFileBuffers
advapi32
RegCloseKey
RegDeleteKeyW
AdjustTokenPrivileges
LookupPrivilegeValueW
LookupPrivilegeNameW
GetTokenInformation
OpenProcessToken
RegSetValueExW
RegQueryValueExW
RegCreateKeyExW
RegOpenKeyExW
shell32
SHCreateDirectoryExW
CommandLineToArgvW
Sections
.text Size: 214KB - Virtual size: 213KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 72KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 372B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE